DNS Security Strategies

Size: px
Start display at page:

Download "DNS Security Strategies"

Transcription

1 DNS Security Strategies By Timothy Rooney, Product Management Director, BT Diamond IP

2 Introduction The domain name system (DNS) is fundamental to the proper operation of nearly every IP network application, from web browsing, , to multi-media applications and more. DNS provides the lookup and translation services from name to IP addresses that are used by computers to communicate. An attack that renders the DNS service unavailable or which manipulates the integrity of the data contained within DNS can effectively bring a network down. As a side effect of its necessity, DNS traffic is generally permitted to flow freely through networks, exposing networks to attacks that leverage this freedom of communications. By its very nature, the global Internet DNS system serves as a distributed data repository containing host names (e.g., website and other addresses) and corresponding IP address information. The distributed nature of DNS applies not only to the global geographic distribution of DNS servers, but to the distribution of administration of the information published within respective domains of this repository. DNS has proven extremely effective and scalable in practice and most people take DNS for granted given this and its proven reliability. However, its essential function and decentralized architecture serve to attract attackers seeking to exploit the architecture and rich data store for sinister activities. This white paper describes various forms of enterprise DNS attacks and strategies you can employ to mitigate these attacks. We ll start with a basic overview of DNS to establish a level set and present potential vulnerabilities, which we ll discuss next, followed by mitigation strategies that can be deployed to reduce exposure to various attack types. DNS basic operation Figure 1 illustrates the basic flow of a DNS query, along with the various data stores for DNS data and corresponding data sources. The DNS resolution process generally starts when a device s user seeks to connect to a website or other IP service. Upon entry of the desired destination by name, software running on the device called a DNS resolver issues a query to its configured recursive DNS server, starting on the left of the figure, unless the query had recently been resolved, where the answer may be returned immediately from the resolver cache if it exists. The recursive DNS server s role is to resolve the query on behalf of the client by using its cache of previously resolved queries or by querying public DNS servers on the Internet. The latter process typically involves several queries to multiple DNS servers to first locate a DNS server that is authoritative for the domain for which the query relates and then to query an authoritative server itself to obtain an answer that can be passed back to the client, thereby completing the resolution process. The recursive server also caches the resolution information in order to respond more quickly to a similar query without having to re-seek the answer on the Internet. DNS Security Strategies BT Diamond Whitepaper 1

3 Multiple authoritative DNS servers are deployed to provide services continuity in the event of a server outage. Generally, an administrator configures a master server that then replicates or transfers its domain information to one or more slave servers. Some DNS solutions enable alternative forms of data replication using LDAP-like replication for example. Figure 1 DNS Query Flow and Data Sources DNS Trust Model The DNS trust model refers here to how DNS information flows among these components of the DNS system. In general information received by other components in the system is trusted though various forms of validation and authentication can improve trustworthiness as we shall discuss later. From the client resolver perspective, it trusts its resolver cache and the recursive server to provide answers to DNS queries. Should either trusted data source be corrupted, the resolver could inadvertently redirect the user application to an inappropriate destination. The recursive server trusts its cache and the various DNS servers it queries internally on the enterprise network or externally on the Internet. It relies not only on accurate responses from authoritative DNS servers but on other domain servers which provide referrals to locate DNS servers authoritative for the domain in question. Referral answers are generally provided by the Internet root servers as well as top level domain (TLD) servers, but referrals may also be provided by other DNS Security Strategies BT Diamond Whitepaper 2

4 servers operated internally or by DNS hosting providers. These referral DNS servers are not shown in Figure 1 but may be queried by the recursive DNS server to walk down the hierarchical domain tree to locate the authoritative DNS servers. Authoritative DNS servers are so called given that they are purportedly operated by or on behalf of the owner of a given DNS domain who is responsible for the information published on these servers. Resolvers attempting to resolve hostnames within the domain of the authoritative server trust the server to respond with accurate information, where accurate means as published by the domain administrator. Information published on authoritative DNS servers originates from a variety of sources including manually edited text files, inter-server transfers and updates, and/or use of IP address management (IPAM) solutions. Inter-server transfers refer to master-slave replication, while updates may originate from other DNS servers, DHCP servers, other systems, or even end user devices if permitted by administrators. DNS Information Sources The DNS trust model provides us one perspective on information flow among components and inherent trust relationships within the resolution process. Examining the sources of each component s information can help us understand how each is potentially configured both in terms of base configuration, such as for what domains a particular server is authoritative, whether it should answer queries from given addresses, etc. and actual DNS resolution data communicated via the DNS protocol. The following table lists potential sources of this information respectively. By referral DNS servers, we include root servers, TLD servers and other authoritative servers within the domain tree that refer recursive DNS servers down the tree ultimately to the authoritative servers. These servers are administered by external organizations with IANA managing the Internet root zone, and TLD administrators managing corresponding DNS servers to publish proper mapping of child domains to corresponding authoritative or referral DNS servers. Component Configuration data sources DNS data sources Client resolver Recursive DNS server Referral DNS servers Authoritative DNS server Configuration or properties file DHCP/PPP server provided parameters Configuration or properties file DNS control channel Hints file of root DNS servers Domain level DNS administrators and tools Configuration file or properties Zone file(s) DNS control channel Resolver cache (if equipped) Recursive DNS server Server cache Forwarder server if configured Referral DNS servers Authoritative DNS servers Child domain administrators provision of their DNS servers names/ip addresses DNS administrator via text editor, DNS GUI or IPAM system DDNS updates to zone files Zone transfers DNS Security Strategies BT Diamond Whitepaper 3

5 DNS as an Attack Target Attackers may target DNS services in and of themselves in order to stifle communications or to steer unwitting end users to imposter web servers or other destinations. Alternatively, DNS may serve as a facilitator for use with the scope of a broader network attack. Just as DNS enables users to connect to websites by resolving text-based destinations to IP addresses, it enables attacker malware to locate command and control centers or to tunnel information through firewalls. DNS by its nature also openly publishes potentially useful information about networks, host names and IP addresses for would-be attackers. We ll examine first those attacks on DNS infrastructure, consisting of DNS servers within your organization and those on the Internet used in the process of name resolution. Then we will discuss more broadly targeted attacks that leverage the DNS. As we shall see given this broad and diverse set of attacks, no single mitigation technology can effectively combat them all; a comprehensive DNS security strategy is necessary to defend against them collectively. We will wrap up the paper with a discussion of various components of such a strategy. Attacks on DNS infrastructure By DNS infrastructure, we refer to the DNS servers themselves, the DNS resolvers which query for address lookups on behalf of user applications on end user devices, the integrity of DNS information, and the collective DNS service of resolving hostnames on behalf of resolvers. DNS Service Denial The familiar Denial of Service (DOS) or distributed DOS (DDOS) attack is invoked by an attacker to flood the DNS server with bogus DNS requests, overwhelming its ability to process legitimate DNS queries. From the DNS server s perspective, it merely attempts to process each query as it is received. As the volume of bogus queries is intensified beyond the query response rate supported by the server, the proportion of legitimate queries lessens and DNS resolution services capacity drops precipitously to only that small proportion that is processed. Denial of service DNS, like other network services, is vulnerable to denial of service (DOS) attacks, which features an attacker sending thousands of packets to a server in hopes of overloading the server, causing it to crash or become otherwise unavailable to other queriers. The service is rendered unavailable and thus denied to others. Distributed Denial of Service - A variant of this type of attack is the use of multiple distributed attack points and is referred to as a distributed denial of service (DDOS) attack. The intent is the same, though the scale is larger, potentially impacting several servers. Wild Goose Chase This attack attempts service denial through the flooding of a recursive server with queries for bogus domain names. This causes the server to initiate a wild goose DNS Security Strategies BT Diamond Whitepaper 4

6 chase and utilize resources to futilely locate the authoritative server within the domain tree. D/DOS attacks can take the form of the issuance of a high volume of DNS queries to deny DNS service but may also comprise issuance of TCP SYN attacks or UDP floods targeted at DNS servers. Cache Poisoning Style Attacks DNS resolvers and recursive caching servers maintain a cache of resolved resource records to improve resolution performance as described earlier. If an attacker succeeds in corrupting a recursive server s cache, the corrupted information may be provided to several users requesting the same or similar domain name information. Corrupting the cache requires an attacker to provide a seemingly legitimate query answer albeit with falsified information in part or in total. This can result in hijacking resolvers and hence applications to incorrect destinations, e.g., web sites. The following forms of cache poisoning attacks have been identified: Packet interception or spoofing Like other client/server applications, DNS is susceptible to man-in-the-middle attacks where an attacker responds to a DNS query with false or misleading additional information. The attacker spoofs the legitimate DNS server response, leading the server to resolve and cache this information. ID Guessing or Query Prediction Another form of malicious resolution is ID guessing. The ID field of the DNS packet header is 16 bits in length, as is the UDP packet header ID. If an attacker can provide a response to the query with the correct ID field and UDP port number, the resolver will accept the response, whatever it contains. This enables the attacker to provide falsified results, assuming the query type, class and queried name are known or guessed by the attacker. Guessing a 2 32 number is relatively easy even with brute force methods. Name Chaining This attack features the provision of supplemental resolution information usually within the Additional or even Authority section of the DNS response packet, thereby poisoning the cache with malicious resolution information. This may for example attempt to falsify information for a popular website such as bt.com, google.com or the like, so when such a query is requested, the resolver will rely on this falsified cached information to essentially redirect the client to the attacker s intended destination. The Kaminsky DNS vulnerability Dan Kaminsky identified a vulnerability which simplified instigation of cache poisoning attacks. An attacker could create a web page with hundreds or thousands of tags with URLs such as img tags, causing the web browser to attempt to resolve each URL using DNS. The attacker knows what queries will be asked, which reduces the challenge to properly guess the transaction ID and UDP port, which as mentioned above, is relatively easy. The query answers will all contain additional information which the server will cache, perhaps the falsified IP addresses of popular websites. DNS Security Strategies BT Diamond Whitepaper 5

7 Authoritative Poisoning Cache poisoning attacks attempt to corrupt DNS information cached within resolvers and recursive servers. Other forms of attack attempt to corrupt DNS information published within authoritative DNS servers. Unlike cached information which eventually times out, corruption of authoritative information could persist for lengthy time periods until detected. Dynamic updates An attacker may attempt to inject or modify data in a DNS zone by attempting to issue a DNS Update message to the DNS server. This type of attack could manipulate resolution data, redirecting resolutions from clients for the intended destination to an attacker-specified destination. Server configuration an attacker may attempt to gain access to the physical server running the DNS service. Configuring appropriate credentials and hardening the DNS server can help mitigate this attack vector as can securing communications to the server whether over SSH or via an IPAM system. Beyond being able to manipulate configuration and zone information, an attack of this type could enable the use of the server as a stepping stone to other targets, especially if this server is trusted internally. Configuration errors while typically not malicious (though most attacks are initiated from internal sources), misconfiguring the DNS service and/or zone information may lead to improper resolution or server behavior. Server/OS Attacks As with all network servers, vulnerabilities within the server operating system may be exploited by attackers in order to severely hamper or crash the server. These attacks can be of the following forms: Operating System attacks An attacker may attempt to gain access to the server by overflowing the code execution stack or buffer. Such an attack may exploit a known vulnerability of the operating system or version of DNS software running on the server. DNS service attacks An attacker may attempt to exploit a known vulnerability for a given version of DNS server software running on the victim server to shut it down or otherwise disrupt service. Control channel attack The DNS server control channel provided in most implementations provides a convenient mechanism to remotely control the DNS server, such as stopping/halting the server s DNS software (e.g., named ), reloading a zone, and more. Such power may entice an attacker to attempt to access the control channel to perform nefarious functions such as stopping the DNS service thereby denying DNS service to querying servers and resolvers. DNS Security Strategies BT Diamond Whitepaper 6

8 Resolver Attacks The resolver on the client device must be initialized with at least one DNS server IP address to which DNS queries can be issued. This IP address is the destination address for all DNS queries originating from the client. Other resolver configuration information such as domains suffixes may also be defined. The resolver configuration may be performed manually by hard-coding the DNS server IP address in the TCP/IP stack, or automatically via DHCP or PPP. Corruption through DHCP/PPP This type of attack seeks to redirect the resolver from the legitimate recursive DNS server to an attacker s DNS server to poison the resolver with malicious DNS query answers. Manipulation of client configuration obtained through DHCP or PPP would entail provision of a rogue DHCP or Radius server on the part of the attacker. Device infiltration An attack to gain access to a device could provide the ability to edit the resolver configuration among other host information. Broader attacks that leverage DNS While several attack types target the DNS infrastructure itself, several broader network attacks leverage the DNS to inflict damage on other network components or to exfiltrate sensitive information outside the network. Network Reconnaissance DNS by design contains a repository of hostname-to-ip address mapping among other things. If an attacker desired to glean information about particular hosts that may be more attractive to attack than others, he/she may start with DNS. Name guessing - One brute force approach to such reconnaissance consists of guessing hostnames of interest (e.g. payroll ) and issuing standard DNS queries to obtain corresponding IP addresses if they exist. Zone transfers Impersonating a DNS slave server and attempting to perform a zone transfer from a master is a form of attack that attempts to map or footprint the zone. That is, by identifying host to IP address mappings, as well as other resource records, the attacker attempts to identify targets for direct attacks. Reflector Style Attacks This form of attack attempts to use one or more DNS servers to send massive amounts of data at a particular target, thereby denying service for the target machine. Reflector attack - The attacker issues numerous queries to one or more DNS servers using the target machine s IP address as the source IP address in each DNS query. DNS Security Strategies BT Diamond Whitepaper 7

9 Amplification Using the reflector approach while querying for resource record types with large quantities of data such as NAPTR, and DNSSEC signed answers amplifies this attack. Each responding server responds with the data to the requestor at the spoofed IP address to inundate this target with a large data flow. Data Exfiltration Data exfiltration refers to the transmission of data originating from within one security domain, e.g., an enterprise network to another entity or organization. There are two basic forms of data exfiltration using DNS: DNS as data protocol (tunneling) - DNS tunneling entails the use of the DNS protocol as a data communications protocol. This technique enables a user or device within the network to communicate with an external destination, easily traversing firewalls (DNS is generally permitted through firewalls). DNS as resource locator an attacker may attempt to install malware on devices via phishing attacks that bait users into opening executable attachments or installing software from an attacker website. Whether a device is attacked while inside the enterprise network or a user device is physically brought onto the network, if they are trusted within the confines of an enterprise network they may have access to sensitive information. The malware may perform data collection, locating internal resources using DNS reconnaissance. In addition, DNS could be used to identify the current IP address of the attacker s external destination for exfiltration of the information. Advanced Persistent Threats Advanced Persistent Threats (APTs) are organized, stealthy forms of network intrusion where an attacker attains access within a target network to steal data, disrupt communications, or otherwise infiltrate network components. APTs are persistent in that the intent is to retain access to the network for a lengthy time frame, if not indefinitely, so they require continual evasion techniques to avoid detection. Attackers may gain access within the network via phishing attacks to deploy malware, social engineering, or other methods. Once within the network, the attacker s malware typically attempts to communicate to a command and control (C&C) center, from which the attacker can instigate attacks, update malware code, or collect information. Many times, this phoning home process involves DNS queries to identify the current IP address of the C&C center. Use of DNS enables the attacker to change IP addresses quickly to avoid detection. In addition, C&C center domain names can be algorithmically generated to support a moving target on the query name as well. DNS Security Strategies BT Diamond Whitepaper 8

10 DNS Mitigation Approaches The diversity of DNS threats presents a serious challenge to IT administrators responsible for managing the operation and integrity of DNS services within their networks. With such a variety of attacks, no single mitigation technology or approach will suffice in defending against them all. A mitigation portfolio is necessary to provision defenses for each major attack threat. This section summarizes the major mitigation techniques available to IT administrators in assembling such a mitigation strategy. Denial of Service Mitigation Effective denial of service mitigation requires limiting the level of server processing of attack packets such that legitimate packets are still handled properly. Methods to reduce the impact of D/DOS attacks include: Inbound ACLs at the server and DNS service level regarding from which IP networks or hosts the server will process queries (recursive servers) Inbound rate limiting of packets from specific sources and/or by type (TCP, UDP, DNS, etc.) (recursive or authoritative servers) DNS anycast deployment where multiple DNS servers use a common IP address. This approach was proven effective against a DDOS attack against Internet DNS root servers in February, 2007 (authoritative servers) To protect against bogus query attacks, limit the number of outstanding queries per client. Cache Poisoning Mitigation Attackers attempt to steer clients to falsified websites for the purposes of stealing personal or other data or for other malicious purposes. The various forms of this style of attack basically entail the attacker answering a valid DNS query with falsified resolution data prior to the arrival of the legitimate answer. The only definitive mitigation to cache poisoning is DNSSEC (DNS security extensions). DNSSEC eliminates the possibility of an attacker successfully poisoning the recursive server cache provided that the resolution data is DNSSEC-signed and the recursive server is configured to validate DNSSEC responses. DNSSEC provides origin authentication such that only the domain publisher can be authenticated as well as data integrity checking to verify no data manipulation occurred in transit between the authoritative server and the recursive server. Authenticated denial of existence of resource record information is also provided by DNSSEC. Authoritative Poisoning Mitigation Poisoning of authoritative DNS server information enables an attacker to modify resolution data directly on the server resolving DNS queries. Authoritative DNS servers may be provisioned with DNS Security Strategies BT Diamond Whitepaper 9

11 resource record data by the following means, each of which may be defended using the corresponding approaches. Zone [file] editing requires either physical access to the server or the ability to transfer a file to the server using a file transfer protocol (FTP, TFTP, SCP, etc.) or via DNS zone transfer. If an administrator uses a separate configuration tool such as a DNS GUI or IPAM system, entry errors or uncaught errors could corrupt a zone s information. Zone information may also be modified using the DNS Update aka Dynamic DNS (DDNS) message. DDNS messages are directed to the master server and updates are replicated to slave servers typically using Notify messages in order to trigger an incremental zone transfer. Mitigation of these forms of zone information corruption consists of the following techniques: DNS server host access controls DNS server operating system hardening to prevent access via unauthorized protocols DNS files permissions setting Use of a robust DNS GUI or IPAM system or use of DNS configuration or zone checking utilities to maximize server information integrity ACLs on hosts/networks from which the server will accept DDNS (and Notify) messages DNS Server Attack Mitigation Compromise of the DNS server or the DNS service running on a server can enable an attacker to reduce the availability of DNS service or to modify DNS configuration. Compromise may come in the form of host access, operating system or DNS service disruption through exploitation of a known vulnerability, or access to the DNS control channel if equipped, which may enable an attacker to stop the DNS service, freeze dynamic updates, or other disruptive activities. The following approaches may be employed to defend against DNS server attacks: DNS server host access controls DNS server operating system hardening to prevent access via unauthorized protocols Monitor security advisories (e.g., CERT) for operating system or DNS service vulnerabilities and keep systems updated to prevent exploitation Inhibit responses to version queries Protect the DNS service control channel using available controls such as ACLs and authentication keys. Resolver Attack Defenses Attackers desiring to steer resolvers to illicit recursive servers may attempt to corrupt the DNS servers setting (among others) of the resolver accordingly. This setting may be configured by editing this information directly on the device or via parameters provided in initialization protocols, such as DHCP or PPP. Protecting against this class of attack necessitates the following actions: DNS Security Strategies BT Diamond Whitepaper 10

12 Device access controls Verify proper provisioning of DHCP/PPP parameter settings Monitor for rogue DHCP servers which may be setting improper parameters Network Reconnaissance The intent of DNS is to publish address information about hosts on the network. However, this information may be gathered and analyzed by an attacker to facilitate target identification for further attacks. Naming hosts intuitively certainly simplifies user accessibility though attractive names may tempt attackers, so this is a trade-off. However, limiting who can query for such information can help constrain the scope of access to this information for recursive or internal authoritative servers. Host information published in external DNS servers (where constraining query sources makes less sense) should be limited to those accessible via the Internet. In summary, the following defense mechanisms may be put in place to protect against overt network reconnaissance: Implement ACLs limiting zone transfers to only other authorized authoritative DNS servers Implement ACLs limiting the scope of hosts that are permitted to query the server Reflector Attack Mitigation Reflector and amplification attacks entail an attacker issuing a high volume of DNS queries using the source IP address of the intended target; hence the target receives a high volume of DNS responses which may deny its ability to perform its intended function. The reflector attack may be amplified by issuing queries from multiple sources, all spoofing the target s IP address and/or by issuing queries for resource records containing large payloads. To protect against this style of attack, the following techniques may be employed: Provision ingress filtering on routers to minimize the ability to spoof addresses Implement response rate limiting to control the flow to a reasonable maximum Data exfiltration Stealing data from sources within a network and transmitting it to an attacker s system externally may prove to be a very attractive attack vector. Use of DNS to identify external system domain names or to serve as the transmission protocol itself facilitates this style of attack. Steps you can take to mitigate these include: Implement a DNS firewall to prevent resolution of known bad domains to reduce resolution possibilities for external attacker systems Monitor DNS transactions to identify potential tunnels DNS Security Strategies BT Diamond Whitepaper 11

13 Advanced Persistent Threats Advanced Persistent Threats (APTs) feature stealthy infiltration of a network typically for the purpose of data exfiltration or other malicious activities. Stealthiness is achieved by the use of rapidly changing code compilation and in other techniques to avert detection. Use of a DNS firewall can help to disable DNS resolution of APT malware bots that use DNS to resolve external command and control centers for instructions. Summary of Major DNS Threats and Mitigation Approaches As we ve seen, several varieties of DNS attacks are possible to disrupt DNS or network communications in general or to leverage DNS intended purpose to identify targets or attack systems with malicious intent. No single mitigation approach can eliminate vulnerabilities to all threats; thus, a multi-pronged mitigation strategy is required to reduce attack exposure. The following table summarizes the threats to DNS and corresponding mitigation approaches for each. Mitigation approaches are summarized in the section following. Denial of Service Threat Threat Summary Mitigation Approaches Denial of service Distributed denial of service Bogus queries Packet Interception/ Spoofing Attacker transmits a high volume of TCP, UDP, DNS or other packets to the DNS server to inundate its resources Attacker transmits a high volume of TCP, UDP, DNS or other packets from multiple sources to the DNS server to inundate its resources Attacker transmits a high volume of bogus queries, causing the recursive server to futilely locate authoritative servers Attacker transmits a DNS response to a recursive DNS server in order to poison its cache, affecting DNS resolution integrity for Inbound rate limiting Anycast deployment Inbound rate limiting Anycast deployment Limit the number of outstanding queries per client DNSSEC validation on recursive servers Source port and XID randomization Qname case manipulation and verification on response DNS Security Strategies BT Diamond Whitepaper 12

14 Threat Threat Summary Mitigation Approaches Cache Poisoning ID Guessing/Query Prediction Kaminsky Attack/Name Chaining Attacker transmits a DNS response(s) to a predicted query using a predicted or variety of XID values. Attacker transmits a DNS response(s) with falsified answers in the DNS message Additional section. The Kaminsky attack produces deterministic queries to facilitate the attack. DNSSEC validation on recursive servers Source port and XID randomization Qname case manipulation and verification on response DNSSEC validation on recursive servers Illicit dynamic update Attacker transmits a DNS Update message(s) to a master DNS server to add, modify or delete a resource record in the target zone Use ACLs on allow-update, allow-notify, notify-source. ACLs may also be defined as requiring transaction signatures for added origin authentication Authoritative Poisoning Server attack/hijack Attacker hacks into the DNS server which enables manipulation of DNS data among other server capabilities Implement host access controls Use hidden masters to inhibit detection of the zone master Harden server operating system and keep up to date Limit port or console access DNS service misconfiguration Vulnerability to configuration errors exposes the DNS service to improper configuration Use checkzone and checkconf or similar utilities Use an IPAM system with error checking Keep fresh backups for reload if needed DNS Security Strategies BT Diamond Whitepaper 13

15 Server/OS Attack Resolver/host attacks Network Reconnaissance Threat Threat Summary Mitigation Approaches Buffer overflows and OS level attacks Control channel attack DNS service vulnerabilities Recursive DNS redirection Resolver Configuration Attack Name guessing Illicit zone transfer Reflector attacks Attacker exploits server operating system vulnerability Attacker accesses the DNS service control channel to disrupt DNS service Attacker exploits DNS service vulnerability Attacker misconfigures resolver to point to illicit recursive DNS server Attacker hacks into the device which enables manipulation of resolver configuration among other device capabilities Attacker issues legitimate DNS queries for names that, if resolved could serve as further attack target Attacker initiates a zone transfer request to an authoritative DNS server to obtain zone resource records to identify potential attack targets Attacker spoofs the target s IP address and issues numerous queries to one or more authoritative DNS servers to inundate the target Harden operating system and keep updated Control channel ACLs Control channel keyed authentication Monitor CERT advisories and update DNS service Do not expose DNS service version to version queries Configure DNS servers via DHCP Monitor for rogue DHCP servers Periodically audit each client for misconfigurations or anomalies Implement host access controls Avoid naming hosts with overly attractive names Use ACLs with TSIG on allow-transfer; and use transfer-source IP address and port to use a nonstandard port for zone transfers Implement ingress filtering on routers to mitigate spoofing Use DNS response rate limiting DNS Security Strategies BT Diamond Whitepaper 14

16 Reflector style attacks Data exfiltration Threat Threat Summary Mitigation Approaches Amplification attacks DNS tunneling Resource locator Attacker amplifies reflector attack by querying for large resource records to increase data flow to target per query Attacker transmits data through firewalls using DNS as the transport protocol Attacker infects internal device which uses DNS to locate command and control center Implement ingress filtering on routers to mitigate spoofing Use DNS response rate limiting Monitor DNS queries for frequent queries between a given client and server especially with large query and response payload DNS firewall APTs Advanced Persistent Threats Attacker deploys adaptable malware within a network to perform nefarious functions to disrupt communications and/or steal information DNS firewall Summary Available, responsive, and accurate DNS service is an absolute must in today s IP networks. But its critical role, not to mention its openness and flexibility render DNS an attractive target for attackers. A multi-faceted approach is required to combat attackers and provide a secure defense. BT Diamond IP products and services enable customers to implement and deploy these defensive measures to proactively protect their DNS infrastructure against attack and against its illicit use for nefarious purposes. DNS Security Strategies BT Diamond Whitepaper 15

17 About BT Diamond IP BT Diamond IP is a leading provider of software and appliance products and services that help customers effectively manage complex IP networks. Our next-generation IP management solutions help businesses more efficiently manage IP address space across mid-to-very large sized enterprise and service provider networks. These products include IPControl for comprehensive IP address management and Sapphire hardware and virtual appliances for DNS/DHCP services deployment. Our cable firmware management product, ImageControl, helps broadband cable operators automate and simplify the process of upgrading and maintaining firmware on DOCSIS devices in the field. Our customers include regional, national and global service providers and enterprises in all major industries. For more information, please contact us directly at worldwide, to btdiamondip-sales@bt.com or consult IPControl is a trademark of BT Americas, Inc. Copyright 2018, BT Americas, Inc. This is an unpublished work protected under the copyright laws. All trademarks and registered trademarks are properties of their respective holders. All rights reserved. DNS Security Strategies BT Diamond Whitepaper 16

DNS Anycast for High Availability and Performance

DNS Anycast for High Availability and Performance White Paper DNS Anycast for High Availability and Performance by Timothy Rooney Product management director BT Diamond IP DNS Anycast for High Availability and Performance By Tim Rooney, Director, Product

More information

Multi-Master DNS Update Management

Multi-Master DNS Update Management White Paper Multi-Master DNS Update Management by Timothy Rooney Product management director BT Diamond IP Introduction DNS is a foundational element of IP communications. To communicate over an IP network,

More information

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS 1 Introduction Your data and infrastructure are at the heart of your business. Your employees, business partners, and

More information

Cloud Automation of Core Network Services

Cloud Automation of Core Network Services White Paper Cloud Automation of Core Network Services by Timothy Rooney Product management director BT Diamond IP Introduction The cloud is transforming the way organizations offer and support computing

More information

Are You Fully Prepared to Withstand DNS Attacks?

Are You Fully Prepared to Withstand DNS Attacks? WHITE PAPER Are You Fully Prepared to Withstand DNS Attacks? Fortifying Mission-Critical DNS Infrastructure Are You Fully Prepared to Withstand DNS Attacks? Fortifying Mission-Critical DNS Infrastructure

More information

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management CompTIA Security+ Lecture Six Threats and Vulnerabilities Vulnerability Management Copyright 2011 - VTC Malware Malicious code refers to software threats to network and systems, including viruses, Trojan

More information

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks CISNTWK-440 Intro to Network Security Chapter 4 Network Vulnerabilities and Attacks Objectives Explain the types of network vulnerabilities List categories of network attacks Define different methods of

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 18: Network Attacks Department of Computer Science and Engineering University at Buffalo 1 Lecture Overview Network attacks denial-of-service (DoS) attacks SYN

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and

More information

DOMAIN NAME SECURITY EXTENSIONS

DOMAIN NAME SECURITY EXTENSIONS DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions

More information

DNS SECURITY BEST PRACTICES

DNS SECURITY BEST PRACTICES White Paper DNS SECURITY BEST PRACTICES Highlights Have alternative name server software ready to use Keep your name server software up-to-date Use DNSSEC-compliant and TSIG-compliant name server software

More information

Outline NET 412 NETWORK SECURITY PROTOCOLS. Reference: Lecture 7: DNS Security 3/28/2016

Outline NET 412 NETWORK SECURITY PROTOCOLS. Reference:  Lecture 7: DNS Security 3/28/2016 Networks and Communication Department NET 412 NETWORK SECURITY PROTOCOLS Lecture 7: DNS Security 2 Outline Part I: DNS Overview of DNS DNS Components DNS Transactions Attack on DNS Part II: DNS Security

More information

CTS2134 Introduction to Networking. Module 08: Network Security

CTS2134 Introduction to Networking. Module 08: Network Security CTS2134 Introduction to Networking Module 08: Network Security Denial of Service (DoS) DoS (Denial of Service) attack impacts system availability by flooding the target system with traffic or by exploiting

More information

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition Chapter 3 Investigating Web Attacks Objectives After completing this chapter, you should be able to: Recognize the indications

More information

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016 Abstract The Mirai botnet struck the security industry in three massive attacks that shook traditional DDoS protection paradigms, proving that the Internet of Things (IoT) threat is real and the grounds

More information

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the

More information

August 14th, 2018 PRESENTED BY:

August 14th, 2018 PRESENTED BY: August 14th, 2018 PRESENTED BY: APPLICATION LAYER ATTACKS 100% 80% 60% 40% 20% 0% DNS is the second most targeted protocol after HTTP. DNS DoS techniques range from: Flooding requests to a given host.

More information

(DNS, and DNSSEC and DDOS) Geoff Huston APNIC

(DNS, and DNSSEC and DDOS) Geoff Huston APNIC D* (DNS, and DNSSEC and DDOS) Geoff Huston APNIC How to be bad 2 How to be bad Host and application-based exploits abound And are not going away anytime soon! And there are attacks on the Internet infrastructure

More information

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats Internetwork Expert s CCNA Security Bootcamp Common Security Threats http:// Today s s Network Security Challenge The goal of the network is to provide high availability and easy access to data to meet

More information

Denial of Service and Distributed Denial of Service Attacks

Denial of Service and Distributed Denial of Service Attacks Denial of Service and Distributed Denial of Service Attacks Objectives: 1. To understand denial of service and distributed denial of service. 2. To take a glance about DoS techniques. Distributed denial

More information

CS System Security Mid-Semester Review

CS System Security Mid-Semester Review CS 356 - System Security Mid-Semester Review Fall 2013 Mid-Term Exam Thursday, 9:30-10:45 you may bring one 8-1/2 x 11 sheet of paper with any notes you would like no cellphones, calculators This is to

More information

Network Security. Thierry Sans

Network Security. Thierry Sans Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability

More information

Introduction to International Domain Names for Applications (IDNA)

Introduction to International Domain Names for Applications (IDNA) White Paper Introduction to International Domain Names for Applications (IDNA) diamondip.com by Timothy Rooney Product management director BT Diamond IP for Applications (IDNA) By Tim Rooney, Director,

More information

Survey of Cyber Moving Targets. Presented By Sharani Sankaran

Survey of Cyber Moving Targets. Presented By Sharani Sankaran Survey of Cyber Moving Targets Presented By Sharani Sankaran Moving Target Defense A cyber moving target technique refers to any technique that attempts to defend a system and increase the complexity of

More information

Securing Domain Name Resolution with DNSSEC

Securing Domain Name Resolution with DNSSEC White Paper Securing Domain Name Resolution with DNSSEC diamondip.com by Timothy Rooney Product management director BT Diamond IP Resolution with DNSSEC Introduction By Tim Rooney, Director, Product Management

More information

2008 DNS Cache Poisoning Vulnerability Cairo, Egypt November 2008

2008 DNS Cache Poisoning Vulnerability Cairo, Egypt November 2008 2008 DNS Cache Poisoning Vulnerability Cairo, Egypt November 2008 Kim Davies Manager, Root Zone Services Internet Corporation for Assigned Names & Numbers How do you attack the DNS? A typical DNS query

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Intrusion Detection Systems Intrusion Actions aimed at compromising the security of the target (confidentiality, integrity, availability of computing/networking

More information

NETWORK SECURITY. Ch. 3: Network Attacks

NETWORK SECURITY. Ch. 3: Network Attacks NETWORK SECURITY Ch. 3: Network Attacks Contents 3.1 Network Vulnerabilities 3.1.1 Media-Based 3.1.2 Network Device 3.2 Categories of Attacks 3.3 Methods of Network Attacks 03 NETWORK ATTACKS 2 3.1 Network

More information

Imperva Incapsula Product Overview

Imperva Incapsula Product Overview Product Overview DA T A SH E E T Application Delivery from the Cloud Whether you re running a small e-commerce business or in charge of IT operations for an enterprise, will improve your website security

More information

DNS Attacks. Haythem EL MIR, CISSP CTO, NACS

DNS Attacks. Haythem EL MIR, CISSP CTO, NACS DNS Attacks Haythem EL MIR, CISSP CTO, NACS Why worry about DNS? All Applications Rely on DNS! VeriSign: DoS attack could shut down internet Denial-of-service attacks are growing faster than bandwidth

More information

WHITEPAPER. Vulnerability Analysis of Certificate Validation Systems

WHITEPAPER. Vulnerability Analysis of Certificate Validation Systems WHITEPAPER Vulnerability Analysis of Certificate Validation Systems The US Department of Defense (DoD) has deployed one of the largest Public Key Infrastructure (PKI) in the world. It serves the Public

More information

Chapter 7. Denial of Service Attacks

Chapter 7. Denial of Service Attacks Chapter 7 Denial of Service Attacks DoS attack: An action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units (CPU),

More information

Routing Security DDoS and Route Hijacks. Merike Kaeo CEO, Double Shot Security

Routing Security DDoS and Route Hijacks. Merike Kaeo CEO, Double Shot Security Routing Security DDoS and Route Hijacks Merike Kaeo CEO, Double Shot Security merike@doubleshotsecurity.com DISCUSSION POINTS Understanding The Growing Complexity DDoS Attack Trends Packet Filters and

More information

The Interactive Guide to Protecting Your Election Website

The Interactive Guide to Protecting Your Election Website The Interactive Guide to Protecting Your Election Website 1 INTRODUCTION Cloudflare is on a mission to help build a better Internet. Cloudflare is one of the world s largest networks. Today, businesses,

More information

DNS Security. Ch 1: The Importance of DNS Security. Updated

DNS Security. Ch 1: The Importance of DNS Security. Updated DNS Security Ch 1: The Importance of DNS Security Updated 8-21-17 DNS is Essential Without DNS, no one can use domain names like ccsf.edu Almost every Internet communication begins with a DNS resolution

More information

A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing

A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing Yuki Katsurai *, Yoshitaka Nakamura **, and Osamu Takahashi ** * Graduate School

More information

Port Mirroring in CounterACT. CounterACT Technical Note

Port Mirroring in CounterACT. CounterACT Technical Note Table of Contents About Port Mirroring and the Packet Engine... 3 Information Based on Specific Protocols... 4 ARP... 4 DHCP... 5 HTTP... 6 NetBIOS... 7 TCP/UDP... 7 Endpoint Lifecycle... 8 Active Endpoint

More information

Understanding the Internet

Understanding the Internet Announcements U.S. National Cybersecurity Understanding the Internet Axess Forum Bios/Photos Law School Event William J. Perry Martin Casado Keith Coleman Dan Wendlandt MS&E 91SI Spring 2004 Stanford University

More information

The F5 Intelligent DNS Scale Reference Architecture

The F5 Intelligent DNS Scale Reference Architecture The F5 Intelligent DNS Scale Reference Architecture End-to-end DNS delivery solutions from F5 maximize the use of organizational resources, while remaining agile and intelligent enough to scale and support

More information

3.5 SECURITY. How can you reduce the risk of getting a virus?

3.5 SECURITY. How can you reduce the risk of getting a virus? 3.5 SECURITY 3.5.4 MALWARE WHAT IS MALWARE? Malware, short for malicious software, is any software used to disrupt the computer s operation, gather sensitive information without your knowledge, or gain

More information

Cloudflare Advanced DDoS Protection

Cloudflare Advanced DDoS Protection Cloudflare Advanced DDoS Protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com

More information

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Data Communication. Chapter # 5: Networking Threats. By: William Stalling Data Communication Chapter # 5: By: Networking Threats William Stalling Risk of Network Intrusion Whether wired or wireless, computer networks are quickly becoming essential to everyday activities. Individuals

More information

Firewalls, IDS and IPS. MIS5214 Midterm Study Support Materials

Firewalls, IDS and IPS. MIS5214 Midterm Study Support Materials Firewalls, IDS and IPS MIS5214 Midterm Study Support Materials Agenda Firewalls Intrusion Detection Systems Intrusion Prevention Systems Firewalls are used to Implement Network Security Policy Firewalls

More information

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges

More information

A Security Evaluation of DNSSEC with NSEC Review

A Security Evaluation of DNSSEC with NSEC Review A Security Evaluation of DNSSEC with NSEC Review Network Security Instructor:Dr. Shishir Nagaraja Submitted By: Jyoti Leeka November 16, 2011 1 Introduction to the topic and the reason for the topic being

More information

PROTECTING INFORMATION ASSETS NETWORK SECURITY

PROTECTING INFORMATION ASSETS NETWORK SECURITY PROTECTING INFORMATION ASSETS NETWORK SECURITY PAUL SMITH 20 years of IT experience (desktop, servers, networks, firewalls.) 17 years of engineering in enterprise scaled networks 10+ years in Network Security

More information

Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems

Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems Section 1: Command Line Tools Skill 1: Employ commands using command line interface 1.1 Use command line commands to gain situational

More information

DNS Security. *http://compsec101.antibozo.net/pa pers/dnssec/dnssec.html. IT352 Network Security Najwa AlGhamdi

DNS Security. *http://compsec101.antibozo.net/pa pers/dnssec/dnssec.html. IT352 Network Security Najwa AlGhamdi DNS Security *http://compsec101.antibozo.net/pa pers/dnssec/dnssec.html 1 IT352 Network Security Najwa AlGhamdi Introduction The DNS provides a mechanism that resolves Internet host names into IP addresses

More information

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51 Acknowledgments Introduction Part I: The Basics in Depth 1 Chapter 1: Windows Attacks 3 Attack Classes 3 Automated versus Dedicated Attacker 4 Remote versus Local 7 Types of Attacks 8 Dedicated Manual

More information

DNS Cache Poisoning Looking at CERT VU#800113

DNS Cache Poisoning Looking at CERT VU#800113 DNS Cache Poisoning Looking at CERT VU#800113 Nadhem J. AlFardan Consulting Systems Engineer Cisco Systems ANOTHER BORING DNS ISSUE Agenda DNS Poisoning - Introduction Looking at DNS Insufficient Socket

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Application Layer IV Dmitri Loguinov Texas A&M University February 13, 2018 1 Chapter 2: Roadmap 2.1 Principles of network applications 2.2

More information

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE s3security.com Security Professional Services S3 offers security services through its Security Professional Services (SPS) group, the security-consulting

More information

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks So we are proposing a network intrusion detection system (IDS) which uses a Keywords: DDoS (Distributed Denial

More information

CyberArk Privileged Threat Analytics

CyberArk Privileged Threat Analytics CyberArk Privileged Threat Analytics Table of Contents The New Security Battleground: Inside Your Network 3 Privileged account security 3 Collect the right data 4 Detect critical threats 5 Alert on critical

More information

Wireless Network Security Fundamentals and Technologies

Wireless Network Security Fundamentals and Technologies Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology

More information

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest

More information

WHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX

WHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX WHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX 1 INTRODUCTION The MITRE Corporation Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK ) Matrix provides a model

More information

LGS INNOVATIONS IP ADDRESS MANAGEMENT

LGS INNOVATIONS IP ADDRESS MANAGEMENT LGS INNOVATIONS IP ADDRESS MANAGEMENT Streamlining Administration for Security and Savings Is your Domain Name System (DNS) getting the attention it deserves? DNS is the hierarchical distributed naming

More information

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL CONTENTS EXECUTIVE SUMMARY 1 WEB APPLICATION SECURITY CHALLENGES 2 INSIST ON BEST-IN-CLASS CORE CAPABILITIES 3 HARNESSING ARTIFICIAL INTELLIGENCE

More information

Wireless LAN Security (RM12/2002)

Wireless LAN Security (RM12/2002) Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For

More information

RSA INCIDENT RESPONSE SERVICES

RSA INCIDENT RESPONSE SERVICES RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access

More information

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 27. Firewalls and Virtual Private Networks Paul Krzyzanowski Rutgers University Fall 2013 November 25, 2013 2013 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive

More information

Computer Security CS 426

Computer Security CS 426 Computer Security CS 426 Lecture 34 DNS Security 1 Domain Name System Translate host names to IP addresses E.g., www.google.com 74.125.91.103 Hostnames are human-friendly IP addresses keep changing And

More information

Application Firewalls

Application Firewalls Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Application Distributed

More information

Security Whitepaper. DNS Resource Exhaustion

Security Whitepaper. DNS Resource Exhaustion DNS Resource Exhaustion Arlyn Johns October, 2014 DNS is Emerging as a Desirable Target for Malicious Actors The current threat landscape is complex, rapidly expanding and advancing in sophistication.

More information

RSA INCIDENT RESPONSE SERVICES

RSA INCIDENT RESPONSE SERVICES RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access

More information

THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY

THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY DATA CENTER WEB APPS NEED MORE THAN IP-BASED DEFENSES AND NEXT-GENERATION FIREWALLS table of contents.... 2.... 4.... 5 A TechTarget White Paper Does

More information

Guide to DDoS Attacks November 2017

Guide to DDoS Attacks November 2017 This Multi-State Information Sharing and Analysis Center (MS-ISAC) document is a guide to aid partners in their remediation efforts of Distributed Denial of Service (DDoS) attacks. This guide is not inclusive

More information

A Review Paper on Network Security Attacks and Defences

A Review Paper on Network Security Attacks and Defences EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY

More information

Threat Pragmatics. Target 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by:

Threat Pragmatics. Target 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by: Threat Pragmatics 25-29 June 2018 PacNOG 22, Honiara, Solomon Islands Supported by: Issue Date: Revision: 1 Target Many sorts of targets: Network infrastructure Network services Application services User

More information

PrecisionAccess Trusted Access Control

PrecisionAccess Trusted Access Control Data Sheet PrecisionAccess Trusted Access Control Defeats Cyber Attacks Credential Theft: Integrated MFA defeats credential theft. Server Exploitation: Server isolation defeats server exploitation. Compromised

More information

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS 10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND

More information

DENIAL OF SERVICE ATTACKS

DENIAL OF SERVICE ATTACKS DENIAL OF SERVICE ATTACKS Ezell Frazier EIS 4316 November 6, 2016 Contents 7.1 Denial of Service... 2 7.2 Targets of DoS attacks... 2 7.3 Purpose of flood attacks... 2 7.4 Packets used during flood attacks...

More information

AKAMAI CLOUD SECURITY SOLUTIONS

AKAMAI CLOUD SECURITY SOLUTIONS AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your

More information

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review ACS-3921-001/4921-001 Computer Security And Privacy Fall 2018 Mid-Term Review ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted and/or modified

More information

Lecture 12. Application Layer. Application Layer 1

Lecture 12. Application Layer. Application Layer 1 Lecture 12 Application Layer Application Layer 1 Agenda The Application Layer (continue) Web and HTTP HTTP Cookies Web Caches Simple Introduction to Network Security Various actions by network attackers

More information

CS System Security 2nd-Half Semester Review

CS System Security 2nd-Half Semester Review CS 356 - System Security 2nd-Half Semester Review Fall 2013 Final Exam Wednesday, 2 PM to 4 PM you may bring one 8-1/2 x 11 sheet of paper with any notes you would like no cellphones, calculators This

More information

Applying ITIL Best Practice Principles to IPAM

Applying ITIL Best Practice Principles to IPAM White Paper Applying ITIL Best Practice Principles to IPAM by Timothy Rooney Product management director BT Diamond IP Applying ITIL Best Practice Principles to IPAM By Tim Rooney, Director, Product Management

More information

CYBER ATTACKS EXPLAINED: PACKET SPOOFING

CYBER ATTACKS EXPLAINED: PACKET SPOOFING CYBER ATTACKS EXPLAINED: PACKET SPOOFING Last month, we started this series to cover the important cyber attacks that impact critical IT infrastructure in organisations. The first was the denial-of-service

More information

Next Week. Network Security (and related topics) Project 3 Q/A. Agenda. My definition of network security. Network Security.

Next Week. Network Security (and related topics) Project 3 Q/A. Agenda. My definition of network security. Network Security. Next Week No sections Network Security (and related topics) EE122 Fall 2012 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other

More information

Chapter 4. Network Security. Part I

Chapter 4. Network Security. Part I Chapter 4 Network Security Part I CCNA4-1 Chapter 4-1 Introducing Network Security Introduction to Network Security CCNA4-2 Chapter 4-1 Introducing Network Security Why is Network Security important? Rapid

More information

DNS: Useful tool or just a hammer? Paul DNS-OARC 06 Oct 2013, Phoenix

DNS: Useful tool or just a hammer? Paul DNS-OARC 06 Oct 2013, Phoenix DNS: Useful tool or just a hammer? Paul Ebersman pebersman@infoblox.com, @paul_ipv6 DNS-OARC 06 Oct 2013, Phoenix 1 Attacking your cache 2 Recursion DNS queries are either recursive or nonrecursive recursive

More information

Denial of Service (DoS)

Denial of Service (DoS) Flood Denial of Service (DoS) Comp Sci 3600 Security Outline Flood 1 2 3 4 5 Flood 6 7 8 Denial-of-Service (DoS) Attack Flood The NIST Computer Security Incident Handling Guide defines a DoS attack as:

More information

Remote DNS Cache Poisoning Attack Lab

Remote DNS Cache Poisoning Attack Lab CS482 Remote DNS Cache Poisoning Attack Lab 1 1 Lab Overview Remote DNS Cache Poisoning Attack Lab The objective of this lab is for students to gain the first-hand experience on the remote DNS cache poisoning

More information

Mitigating Outgoing Spam, DoS/DDoS Attacks and Other Security Threats

Mitigating Outgoing Spam, DoS/DDoS Attacks and Other Security Threats Solution Brief Mitigating Outgoing Spam, DoS/DDoS Attacks and Other Security Threats 2006 Allot Communications Ltd. Allot Communications, NetEnforcer and the Allot logo are registered trademarks of Allot

More information

Denial of Service, Traceback and Anonymity

Denial of Service, Traceback and Anonymity Purdue University Center for Education and Research in Information Assurance and Security Denial of Service, Traceback and Anonymity Clay Shields Assistant Professor of Computer Sciences CERIAS Network

More information

Implementing Cisco Network Security (IINS) 3.0

Implementing Cisco Network Security (IINS) 3.0 Implementing Cisco Network Security (IINS) 3.0 COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using

More information

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities Ethical Hacking and Countermeasures: Web Chapter 3 Web Application Vulnerabilities Objectives After completing this chapter, you should be able to: Understand the architecture of Web applications Understand

More information

Smart Attacks require Smart Defence Moving Target Defence

Smart Attacks require Smart Defence Moving Target Defence Smart Attacks require Smart Defence Moving Target Defence Prof. Dr. Gabi Dreo Rodosek Executive Director of the Research Institute CODE 1 Virtual, Connected, Smart World Real World Billions of connected

More information

Network Security (and related topics)

Network Security (and related topics) Network Security (and related topics) EE122 Fall 2012 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues at Princeton

More information

CyberP3i Course Module Series

CyberP3i Course Module Series CyberP3i Course Module Series Spring 2017 Designer: Dr. Lixin Wang, Associate Professor Firewall Configuration Firewall Configuration Learning Objectives 1. Be familiar with firewalls and types of firewalls

More information

Security for SIP-based VoIP Communications Solutions

Security for SIP-based VoIP Communications Solutions Tomorrow Starts Today Security for SIP-based VoIP Communications Solutions Enterprises and small to medium-sized businesses (SMBs) are exposed to potentially debilitating cyber attacks and exploitation

More information

CSC 574 Computer and Network Security. DNS Security

CSC 574 Computer and Network Security. DNS Security CSC 574 Computer and Network Security DNS Security Alexandros Kapravelos kapravelos@ncsu.edu (Derived from slides by Will Enck and Micah Sherr) A primer on routing Routing Problem: How do Alice s messages

More information

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection Zero Trust on the Endpoint Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection March 2015 Executive Summary The Forrester Zero Trust Model (Zero Trust) of information

More information

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE 12-07-2016 BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE Your external DNS is a mission critical business resource.

More information

5. Execute the attack and obtain unauthorized access to the system.

5. Execute the attack and obtain unauthorized access to the system. Describe how a combination of preventive, detective, and corrective controls can be employed to provide reasonable assurance about information security. Before discussing the preventive, detective, and

More information

Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring

Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring Learning Objective Explain the importance of security audits, testing, and monitoring to effective security policy.

More information

Domain Name System Security

Domain Name System Security Domain Name System Security T-110.4100 Tietokoneverkot October 2008 Bengt Sahlin 2008/10/02 Bengt Sahlin 1 Objectives Provide DNS basics, essential for understanding DNS security

More information

CIS 5373 Systems Security

CIS 5373 Systems Security CIS 5373 Systems Security Topic 4.1: Network Security Basics Endadul Hoque Slide Acknowledgment Contents are based on slides from Cristina Nita-Rotaru (Northeastern) 2 Network Security INTRODUCTION 3 What

More information

20-CS Cyber Defense Overview Fall, Network Basics

20-CS Cyber Defense Overview Fall, Network Basics 20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter

More information